Sciweavers

1460 search results - page 154 / 292
» Very Lightweight Requirements Modeling
Sort
View
IPPS
2006
IEEE
14 years 3 months ago
A design of overlay anonymous multicast protocol
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao...
INFOSCALE
2006
ACM
14 years 3 months ago
A predictive approach to achieving consistency in cooperative caching in MANET
Cooperative caching is a very important technique for efficient data dissemination and sharing in mobile ad hoc networks (MANETs). Many applications have requirements on the consi...
Yu Huang 0002, Jiannong Cao, Beihong Jin
ACSC
2005
IEEE
14 years 2 months ago
Simulating Network Robustness for Critical Infrastructure Networks
We examine the robustness of critical infrastructure networks in the face of terrorist attack, using a simulation experiment that incorporates link capacity; and an extension of d...
Anthony H. Dekker
CEEMAS
2005
Springer
14 years 2 months ago
Multiagents Applied to Humanitarian Demining
Abstract. The complexity associated to Humanitarian Demining becomes very high due to its broad set of activities, which beyond the already complex of landmine removal, includes ot...
Pedro Santana, José Barata, Luís Flo...
SACRYPT
2005
Springer
138views Cryptology» more  SACRYPT 2005»
14 years 2 months ago
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attac...
An Braeken, Joseph Lano